Lines Matching refs:ret

167 		TSS_RESULT ret;
171 ret = Tspi_TPM_PcrRead(hTPM, i, &datalen, &data);
172 if (ret) {
173 print_error(ret, gettext("Read PCR"));
174 return (ret);
180 ret = Tspi_Context_FreeMemory(hContext, data);
181 if (ret) {
182 print_error(ret, gettext("Free PCR memory"));
183 return (ret);
276 TSS_RESULT ret;
282 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO,
284 if (ret) {
285 print_error(ret, gettext("Get key size"));
290 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO,
292 if (ret) {
293 print_error(ret, gettext("Get key usage"));
298 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO,
300 if (ret) {
301 print_error(ret, gettext("Get key algorithm"));
307 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO,
309 if (ret) {
310 print_error(ret, gettext("Get key authusage"));
316 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO,
318 if (ret) {
319 print_error(ret, gettext("Get key signature scheme"));
325 ret = Tspi_GetAttribUint32(hKey, TSS_TSPATTRIB_KEY_INFO,
327 if (ret) {
328 print_error(ret, gettext("Get key encoding scheme"));
334 ret = Tspi_GetAttribData(hKey, TSS_TSPATTRIB_KEY_BLOB,
336 if (ret) {
337 print_error(ret, gettext("Get key blob"));
341 ret = Tspi_Context_FreeMemory(hContext, keyInfo);
342 if (ret) {
343 print_error(ret, gettext("Free key info buffer"));
421 TSS_RESULT ret;
434 ret = Tspi_Context_GetRegisteredKeysByUUID2(hContext,
436 if (ret) {
437 print_error(ret, gettext("Get key hierarchy"));
452 ret = Tspi_Context_FreeMemory(hContext, (BYTE *) keys);
453 if (ret) {
454 print_error(ret, gettext("Free key list"));
463 ret = Tspi_Context_GetKeyByUUID(hContext, TSS_PS_TYPE_USER,
465 if (ret == TSP_ERROR(TSS_E_PS_KEY_NOTFOUND)) {
466 ret = Tspi_Context_GetKeyByUUID(hContext,
469 if (ret) {
470 print_error(ret, gettext("Get key by UUID"));
487 TSS_RESULT ret;
501 ret = Tspi_Context_UnregisterKey(hContext, TSS_PS_TYPE_USER,
503 if (ret == TSP_ERROR(TSS_E_PS_KEY_NOTFOUND)) {
504 ret = Tspi_Context_UnregisterKey(hContext, TSS_PS_TYPE_SYSTEM,
507 if (ret) {
508 print_error(ret, gettext("Unregister key"));
521 TSS_RESULT ret;
527 ret = Tspi_TPM_ClearOwner(hTPM, FALSE);
528 if (ret) {
529 print_error(ret, gettext("Clear TPM owner"));
538 TSS_RESULT ret;
544 ret = Tspi_TPM_SetStatus(hTPM, TSS_TPMSTATUS_RESETLOCK, TRUE);
545 if (ret) {
546 print_error(ret, gettext("Reset Lock"));
607 TSS_RESULT ret;
614 ret = Tspi_Context_CreateObject(hContext, TSS_OBJECT_TYPE_RSAKEY,
620 if (ret) {
621 print_error(ret, gettext("Create endorsement key object"));
627 ret = get_random(sizeof (nonce), (BYTE *) &nonce);
628 if (ret)
633 ret = Tspi_TPM_CreateEndorsementKey(hTPM, hKeyEK, &ValidationData);
634 if (ret) {
635 print_error(ret, gettext("Create endorsement key"));
646 TSS_RESULT ret;
653 ret = Tspi_Context_CreateObject(hContext, TSS_OBJECT_TYPE_RSAKEY,
655 if (ret) {
656 print_error(ret, gettext("Create storage root key"));
664 ret = Tspi_TPM_TakeOwnership(hTPM, hKeySRK, NULL);
665 if (ret == TPM_E_NO_ENDORSEMENT) {
668 ret = Tspi_TPM_TakeOwnership(hTPM, hKeySRK, NULL);
670 if (ret) {
671 print_error(ret, gettext("Take ownership"));
686 TSS_RESULT ret;
694 ret = Tspi_Context_CreateObject(hContext, TSS_OBJECT_TYPE_POLICY,
696 if (ret) {
697 print_error(ret, gettext("Create policy object"));
704 ret = Tspi_ChangeAuth(hTPM, NULL, hNewPolicy);
705 if (ret && ret != TSP_ERROR(TSS_E_POLICY_NO_SECRET)) {
706 print_error(ret, gettext("Change authorization"));